Search Result Save to File Save as CSV
Your search for 31025 returns 5379 document(s)
Theory frame of water resources security monitoring, Hal. 3737-3741
Author: Mingqi Chang; Lei Xu; Yue Wang; Shaohua Lu; | Call Number: SEM-302 | Type: Indeks Artikel prosiding/Sem
Find Similar |  Add To Favorites |  Detail in New Window 
Software protection : practical and legal steps to protect and market computer programs/ G. Gervaise Davis III
Author: Davis, G. Gervaise; | Call Number: 347.306 Dav s | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Practical unix & internet security/O'reilly & Associates, Inc
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
COBIT 5 : For Information Security
Call Number: 004.068 Cob | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Memahami modul enkripsi dan security data/
Call Number: 005.8 Mem (MTI SLB) | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Introduction to network security theory and practice
Author: Wang, Jie; | Call Number: 005.8 Wan i | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
Pengembangan router security policy dengan mengevaluasi screening router study kasus : last mile internet provider
Author: Ferdi S.Tasik; | Call Number: T-0383 (Softcopy T-0022) | Edition: 2003 | Type: Tesis
Find Similar |  Add To Favorites |  Detail in New Window 
Practical unix security/Simson Garfinkel and Gene Spafford
Author: Garfinkel, Simson; | Call Number: 005.8 Gar p | Type: Buku
Find Similar |  Add To Favorites |  Detail in New Window 
PFIRES: A Policy Framework for Information Security
Author: Jackie Rees, [et all] | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Dependency analysis of risks in information security
Author: S. Kondakci | Type: Indeks Artikel Jurnal
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   15 16 17 18 19 20 21 22 23 24  Next